Category : Security

HTTP authentication is a simple and secure way to protect sensitive content from unauthorized users. This article will show you how to set up basic HTTP authentication on an NGINX server running on Ubuntu and CentOS. Prerequisites An Ubuntu 16.04, 18.04, 20.04 or 22.04 LTS / CentOS version 6, 7 or 8 server with a ..

Read more

Introduction Iptables is a powerful Linux utility that allows system administrators to configure the kernel’s built-in firewall. Iptables uses a set of rules to determine how to filter network traffic. Each rule specifies what type of traffic to filter and what action to take on matching traffic. In this guide, we will discuss some basic ..

Read more

Introduction Although many users require a database management system like MySQL’s functionality, they might not feel at ease interacting with the system only through the MySQL command line client. To enable user interaction with MySQL via a web interface, PhpMyAdmin was developed. We’ll go over installing and securing PhpMyAdmin in this guide, so you can ..

Read more

Many websites and applications begin with the web server and database backend running on the same machine. A setup like this, on the other hand, can become complicated and challenging to scale over time. The solution is to separate these functions and establishing a remote database. Permitting the server and database to grow independently on ..

Read more

Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host, or between two remote hosts. It is based on the Secure Shell (SSH) protocol. “SCP” commonly refers to both the Secure Copy Protocol and the program itself. Step 1 : Install SCP On Mac and Linux, the SCP command is pre-installed, so no ..

Read more

What is SSH? The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. An SSH client programme is typically used for establishing connections to an SSH daemon accepting remote connections. Both are commonly present on most modern operating systems, including macOS, Linux, OpenBSD, FreeBSD… In this guide, you will secure the SSH port and disable the root ..

Read more